참고문헌
- Vijayakumar,P., Bose,S., Kannan,A., and Siva Subramanian,S., "A secure key distribution protocol for multicast communication," Balasubramaniam P. (eds.) Gandhigram-India, CCIS.,Vol.140, Springer, Heidelberg, 2011, pp. 249-257.
- Vijayakumar,P., Bose,S., Kannan,A., "Centralized Key Distribution Protocol using the Greatest Common Divisor Method," Computers & Mathematics with Applications, Elsevier, Article Online.
- Mingyan Li, Poovendran,R., David McGrew,A., "Minimizing center key storage in hybrid one-way function based group key management with communication constraints," Elsevier, Information Processing Letters, Vol.93, No.4, pp. 191-198, 2004.
- Patrick P.C Lee, John C. S Lui, David K.Y Yau, "Distributed collaborative key agreement protocols for dynamic peer groups," in Proc. of the IEEE International Conference on Network Protocols, pp. 322, 2002.
- Lihao Xu, Cheng Huang, "Computation-efficient multicast key distribution," IEEE Transactions on Parallel and Distributed Systems, Vol.19,No.5, pp. 1-10,2008. https://doi.org/10.1109/TPDS.2008.4396954
- Wade Trappe, Jie Song, Radha Poovendran, K. J Ray Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. 1449-1452, 2001.
- Lee,J.S., Son,J.H., Park, Y.H.,Seo,S.W., "Optimal level-homogeneous tree structure for logical key hierarchy," in Proc. of IEEE Conference on Communication System Software and Middleware Workshop (COMSWARE), 2008.
- Dong-Hyun Je, Jun-Sik Lee, Yongsuk Park, Seung-Woo Seo, "Computation-and-storage-efficient key tree management protocol for secure multicast communications," Elsevier, Computer Communications, Vol.33, No.6, pp. 136-148, 2010. https://doi.org/10.1016/j.comcom.2009.08.007
- Wong, C., Gouda,M., and Lam,S., "Secure group communications using key graphs, IEEE/ACM Transactions on Networking," Vol. 8, No.1, pp.16-30, 2000. https://doi.org/10.1109/90.836475
- David,A., McGrew and Alan T. Sherman, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on software engineering, Vol.29,No.5, pp. 444-458, 2003. https://doi.org/10.1109/TSE.2003.1199073
- Poovendran,R., Baras,J.S., "An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes," IEEE Transactions on Information Theory, Vol. 47, No.7, pp. 2824-2834, 2001. https://doi.org/10.1109/18.959263
- Wade Trappe, Jie Song, Radha Poovendran, Ray Liu K J, "Key management and distribution for secure multimedia multicast," IEEE Transactions on Multimedia,Vol.5,No.4, pp. 544-557, 2003. https://doi.org/10.1109/TMM.2003.1244817
- Xianjin Fang, Longshu Li, "On karatsuba multiplication algorithm," in Proc. of 7th Int. Data, Privacy, and E-Commerce Symp., Washington, DC, USA, pp. 274-276, 2007.
- Tom St Denis, "Bignum math implementing cryptographic multiple precision arithmetic," SYNGRESS Publishing, 2003.
- Meftah,S., Razali,R., Samsudin,A., Budiator,R., "Enhancing public-key cryptosystem using parallel karatsuba algorithm with socket programming," in Proc. of 9th Asia-Pacific Conference on Coomunication, Penang, Malaysia, September 21-24, pp. 706-710, 2003.
- Jebelean,T., "Using the parallel karatsuba algorithm for long integer multiplication and division," in Proc. of European Conference on Parallel Processing, in Lecture Notes in Computer Science, pp. 1169-1172, 1997.
- Vijayakumar,P., Bose,S., Kannan,A., and Siva Subramanian,S., "An effective key distribution protocol for secure multicast communication," in Proc. of IEEE International Conference on Advanced Computing, Chennai, December 14-16, pp. 102-107, 2010.
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar, "Key-update distribution in secure group communication," Elsevier, Computer Communications,Vol. 33,No.6, pp.689-705, 2010. https://doi.org/10.1016/j.comcom.2009.11.014
- Bezawada Bruhadeshwar, Kishore Kothapalli, "A family of collusion resistant symmetric key protocols for authentication," ICDCN, pp. 387-392, 2008.
- Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya, "Reducing the cost of session key establishment," ARES, pp. 369-373, 2009.
- Bezawada Bruhadeshwar, Kishore Kothapalli, Poornima,M., Divya,M., "Routing protocol security using symmetric key based techniques," ARES, pp. 193-200, 2009.
- MacWilliams,F.J., and Sloane,N.J.A., "The theory of error correcting codes," North-Holland Math. Library,1977.
- Adrian Perrig, Dawn Song, Tygar,J.D., "ELK: a new protocol for efficient large-group key distribution," in Proc. of IEEE Symposium on Security and Privacy Symposium, pp. 247-262, 2001.
- Harney,H., Harder,E., "Logical key hierarchy protocol," Internat Draft, IETF, Expired in August 1999.
- Xixiang Lv and Hui Li, "Group Key Agreement From Signcryption," KSII transactions on internet and information systems, Vol. 6, No. 12, pp. 3338-3351, Dec 2012.
- Guiyi Wei, Xianbo Yang and Jun Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII transactions on internet and information systems, Vol. 6, No.12, pp.3352-3365, Dec 2012.
피인용 문헌
- Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels vol.8, pp.10, 2013, https://doi.org/10.3837/tiis.2014.10.016
- An efficient group key agreement protocol for secure P2P communication vol.9, pp.17, 2013, https://doi.org/10.1002/sec.1578
- An effective key distribution for secure internet pay‐TV using access key hierarchies vol.9, pp.18, 2016, https://doi.org/10.1002/sec.1680
- On the Exploration of Adaptive Mechanisms Providing Reliability in Clustered WSNs for Power Plant Monitoring vol.2016, pp.None, 2013, https://doi.org/10.1155/2016/4158735
- Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks vol.20, pp.3, 2013, https://doi.org/10.1007/s10586-017-0848-x
- Managing key multicasting through orthogonal systems vol.20, pp.8, 2013, https://doi.org/10.1080/09720529.2016.1190563
- Provably secure attribute based signcryption with delegated computation and efficient key updating vol.11, pp.5, 2017, https://doi.org/10.3837/tiis.2017.05.019
- Self-Similar key generation for secure communication in multimedia applications vol.77, pp.8, 2013, https://doi.org/10.1007/s11042-018-5688-z
- Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication vol.2021, pp.None, 2013, https://doi.org/10.1155/2021/5599996